Skip to main content

2016 | OriginalPaper | Buchkapitel

Secured Data Storage and Computation Technique for Effective Utilization of Servers in Cloud Computing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud computing delivers digital services over the internet by using various applications which were carried out at distributed datacenters by computer systems. It provides protocol based high performance computing which permits shared storage and computation over long distances. This proposed work bridges the efficient computation and secure storage in cloud environment. Secure cloud storing includes receiving the data by cloud server for storage after applying security steps like authentication, encryption of data and allocation of storage space. In cloud computing, a secured computing infrastructure is provided to cloud user through computing request and commitment generation. Dynamic server stipulation by cuckoo algorithm is utilized after the completion of successful user access. The uncheatable computation, secure access and storage of proposed work achieve confidentiality. It improves the efficiency and manages concurrent users’ requests.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Kumar, K., Lu, Y.H.: Cloud computing for mobile users: can offloading computation save energy. J. Comput. 4, 51–56 (2010) Kumar, K., Lu, Y.H.: Cloud computing for mobile users: can offloading computation save energy. J. Comput. 4, 51–56 (2010)
2.
Zurück zum Zitat Pallis, G.: Cloud computing the new frontier of internet computing. J. Comput. 14(5), 70–73 (2010) Pallis, G.: Cloud computing the new frontier of internet computing. J. Comput. 14(5), 70–73 (2010)
3.
Zurück zum Zitat Koehler, M.: An adaptive framework for utility-based optimization of scientific applications in the cloud. J. Cloud Comput. Adv. Syst. Appl. 3(4), 1–12 (2014) Koehler, M.: An adaptive framework for utility-based optimization of scientific applications in the cloud. J. Cloud Comput. Adv. Syst. Appl. 3(4), 1–12 (2014)
4.
Zurück zum Zitat Buyyaa, R., Yeoa, C.S, Venugopala, S., Broberg, J., Brandic, I.: Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. J. Future Gener. Comput. Syst. 25, 599–616 (2009) Buyyaa, R., Yeoa, C.S, Venugopala, S., Broberg, J., Brandic, I.: Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. J. Future Gener. Comput. Syst. 25, 599–616 (2009)
5.
Zurück zum Zitat Sultan, N.: Cloud computing for education: a new dawn. J. Inf. Manag. 30, 109–116 (2010) Sultan, N.: Cloud computing for education: a new dawn. J. Inf. Manag. 30, 109–116 (2010)
6.
Zurück zum Zitat Marc, M., Stephan G., Alexander, S.: User-controlled resource management in federated clouds. J. Cloud Comput. Adv. Syst. Appl. 3(10), 1–18 (2014) Marc, M., Stephan G., Alexander, S.: User-controlled resource management in federated clouds. J. Cloud Comput. Adv. Syst. Appl. 3(10), 1–18 (2014)
7.
Zurück zum Zitat Voss, A., Barker, A., Targhi, M.A., Ballegooijen, A.V., Sommerville, I.: An elastic virtual infrastructure for research applications (ELVIRA). J. Cloud Comput. Adv. Syst. Appl. 2(20), 1–11 (2013) Voss, A., Barker, A., Targhi, M.A., Ballegooijen, A.V., Sommerville, I.: An elastic virtual infrastructure for research applications (ELVIRA). J. Cloud Comput. Adv. Syst. Appl. 2(20), 1–11 (2013)
8.
Zurück zum Zitat Lombardi, F., Pietro, R.D.: Secure virtualization for cloud computing. J. Netw. Comput. Appl. 34(4), 1113–1122 (2011) Lombardi, F., Pietro, R.D.: Secure virtualization for cloud computing. J. Netw. Comput. Appl. 34(4), 1113–1122 (2011)
9.
Zurück zum Zitat Ali, M., Khan, S.U., Vasilakos, V.A.: Security in cloud computing: opportunities and challenges. J. Inf. Sci. 305, 357–383 (2015) Ali, M., Khan, S.U., Vasilakos, V.A.: Security in cloud computing: opportunities and challenges. J. Inf. Sci. 305, 357–383 (2015)
10.
Zurück zum Zitat Sheikh, M.H., Sascha, H., Sebastian, R., Max, M.: Trust as a facilitator in cloud computing: a survey. J. Cloud Comput. Adv. Syst. Appl. 1, 1–18 (2012) Sheikh, M.H., Sascha, H., Sebastian, R., Max, M.: Trust as a facilitator in cloud computing: a survey. J. Cloud Comput. Adv. Syst. Appl. 1, 1–18 (2012)
11.
Zurück zum Zitat Hashizume, K., Rosado, D.G., Medina, E.F., Fernandez, E.B.: An analysis of security issues for cloud computing. J. Internet Serv. Appl. 4, 1–13 (2013) Hashizume, K., Rosado, D.G., Medina, E.F., Fernandez, E.B.: An analysis of security issues for cloud computing. J. Internet Serv. Appl. 4, 1–13 (2013)
12.
Zurück zum Zitat Gonzalez, N., Milers, C., Redigolo, F., Simplicio, M., Carvalho, T., Naslund, M., Pourzandi, M.: A quantitative analysis of current security concerns and solutions for cloud computing. J. Cloud Comput. Adv. Syst. Appl. 1, 1–18 (2012) Gonzalez, N., Milers, C., Redigolo, F., Simplicio, M., Carvalho, T., Naslund, M., Pourzandi, M.: A quantitative analysis of current security concerns and solutions for cloud computing. J. Cloud Comput. Adv. Syst. Appl. 1, 1–18 (2012)
13.
Zurück zum Zitat Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. J. Trans. Parallel Distrib. Syst. 25(1), 222–233 (2014) Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. J. Trans. Parallel Distrib. Syst. 25(1), 222–233 (2014)
14.
Zurück zum Zitat Yang, K., Jia, X.: An efficient and secure dynamic auditing protocol for data storage in cloud computing. J. Parallel Distrib. Syst. 24, 1717–1726 (2013) Yang, K., Jia, X.: An efficient and secure dynamic auditing protocol for data storage in cloud computing. J. Parallel Distrib. Syst. 24, 1717–1726 (2013)
15.
Zurück zum Zitat Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., Vasilakos, A.V,: Security and privacy for storage and computation in cloud computing. J. Inf. Sci. 258, 371–386 (2014) Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., Vasilakos, A.V,: Security and privacy for storage and computation in cloud computing. J. Inf. Sci. 258, 371–386 (2014)
16.
Zurück zum Zitat Moghaddam, F., Alrashdan, M., Karimi, O.: A hybrid encription algorithm based on RSA small-e and efficient-RSA for cloud computing environments. J. Adv. Comput. Netw. 1(3) (2013) Moghaddam, F., Alrashdan, M., Karimi, O.: A hybrid encription algorithm based on RSA small-e and efficient-RSA for cloud computing environments. J. Adv. Comput. Netw. 1(3) (2013)
17.
Zurück zum Zitat Yuwen, Z., Hongqi, Z., Yibao, B.: Study of the AES realization method on the reconfigurable hardware. In: International Conference on Computer Sciences and Applications, pp. 72–76. IEEE, Wuhan (2013) Yuwen, Z., Hongqi, Z., Yibao, B.: Study of the AES realization method on the reconfigurable hardware. In: International Conference on Computer Sciences and Applications, pp. 72–76. IEEE, Wuhan (2013)
18.
Zurück zum Zitat Kemal. B., Devrim, U., Nadir, A., Oktay, A.: Mobile authentication secure against man-in-the-middle attacks. In: 2nd International Conference on Mobile Cloud Computing, Services and Engineering, pp. 273–276. IEEE, Oxford (2014) Kemal. B., Devrim, U., Nadir, A., Oktay, A.: Mobile authentication secure against man-in-the-middle attacks. In: 2nd International Conference on Mobile Cloud Computing, Services and Engineering, pp. 273–276. IEEE, Oxford (2014)
19.
Zurück zum Zitat Yang, S.X., Deb, S.: Cuckoo search via Levy flights. In: World Congress on Nature and Biologically Inspired Computing, pp. 210–214. IEEE, Coimbatore (2009) Yang, S.X., Deb, S.: Cuckoo search via Levy flights. In: World Congress on Nature and Biologically Inspired Computing, pp. 210–214. IEEE, Coimbatore (2009)
20.
Zurück zum Zitat Xingquan, Z., Guoxiang, Z., Wei, T.: Self-adaptive learning PSO-based deadline constrained task scheduling for hybrid IaaS Cloud. J. Autom. Sci. Eng. 11(2), 564–573 (2014) Xingquan, Z., Guoxiang, Z., Wei, T.: Self-adaptive learning PSO-based deadline constrained task scheduling for hybrid IaaS Cloud. J. Autom. Sci. Eng. 11(2), 564–573 (2014)
21.
Zurück zum Zitat Zineddine, M.: Vulnerabilities and mitigation techniques toning in the cloud: a cost and vulnerabilities coverage optimization approach using cuckoo search algorithm with Levy flights. J. Comput. Secur. 48, 1–18 (2015) Zineddine, M.: Vulnerabilities and mitigation techniques toning in the cloud: a cost and vulnerabilities coverage optimization approach using cuckoo search algorithm with Levy flights. J. Comput. Secur. 48, 1–18 (2015)
22.
Zurück zum Zitat Singh, S., Kalra, M.: Scheduling of independent tasks in cloud computing using modified genetic algorithm. In: International Conference on Computational Intelligence and Communication Networks (CICN), pp. 565–569, IEEE, Bhopal (2014) Singh, S., Kalra, M.: Scheduling of independent tasks in cloud computing using modified genetic algorithm. In: International Conference on Computational Intelligence and Communication Networks (CICN), pp. 565–569, IEEE, Bhopal (2014)
Metadaten
Titel
Secured Data Storage and Computation Technique for Effective Utilization of Servers in Cloud Computing
verfasst von
Manoj Tyagi
Manish Manoria
Copyright-Jahr
2016
DOI
https://doi.org/10.1007/978-3-319-30933-0_53

Premium Partner